IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spamming

RSS Feed    Add to Google    Add to My Yahoo!
Spamming White Papers (View All Report Types)
 
Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

Institutional Identity Theft: How the Identity Theft of Your Customers Leads to the Erosion of Your Company's Profits and Good Name
sponsored by Perimeter eSecurity
WHITE PAPER: Read this whitepaper for a look at the real losses sustained by organizations whose customers experience identity theft and best policies, procedures, and solutions to reduce your organizations risk.
Posted: 04 Dec 2008 | Published: 04 Dec 2008

Perimeter eSecurity

10 Questions to Ask Before You Buy an Anti‐Spam Solution
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

The Advantages of a Hosted Security Model
sponsored by Websense, Inc.
WHITE PAPER: Learn how organizations today are responding to new types of email threats. This white paper discusses how a hosted security is now a viable solution for organizations and is increasingly deployed to ensure better security and reduced costs.
Posted: 19 Jun 2008 | Published: 01 Apr 2008

Websense, Inc.

NAC: Managing Unauthorized Computers
sponsored by Sophos, Inc.
WHITE PAPER: Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent.
Posted: 18 Feb 2008 | Published: 01 Apr 2007

Sophos, Inc.

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK

2010 Threat Report
sponsored by Websense, Inc.
WHITE PAPER: Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Websense, Inc.

Network Testing Labs Review: Make Internet Risks and Perils Disappear
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.
Posted: 23 Nov 2009 | Published: 30 Jun 2009

McAfee, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement